Research Article

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Figure 10

Strategy evaluation, layered DAGs, 0%-nodes.
(a) Attacker, high noise
(b) Attacker, low noise
(c) Attacker, no noise
(d) Defender, high noise
(e) Defender, low noise
(f) Defender, no noise